New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 875885 link

Starred by 1 user

Issue metadata

Status: Verified
Owner:
Closed: Aug 21
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 1
Type: Bug-Security



Sign in to add a comment

Bad-cast to CharacterStream<uint16_t>' (aka 'CharacterStream<unsigned short>') from v8::internal::RelocatingCharacterStream<unsigned char> in v8::internal::wasm::AsmJsParser::AsmJsParser

Project Member Reported by ClusterFuzz, Aug 20

Issue description

Detailed report: https://clusterfuzz.com/testcase?key=6167910104694784

Fuzzer: decoder_langfuzz
Job Type: linux_ubsan_vptr_d8
Platform Id: linux

Crash Type: Bad-cast
Crash Address: 0x5562140309d0
Crash State:
  Bad-cast to CharacterStream<uint16_t>' (aka 'CharacterStream<unsigned short>') from v8::internal::RelocatingCharacterStream<unsigned char>
  v8::internal::wasm::AsmJsParser::AsmJsParser
  v8::internal::AsmJsCompilationJob::ExecuteJobImpl
  
Sanitizer: undefined (UBSAN)

Recommended Security Severity: High

Regressed: https://clusterfuzz.com/revisions?job=linux_ubsan_vptr_d8&range=55216:55217

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6167910104694784

Issue filed automatically.

See https://github.com/google/clusterfuzz-tools for more information.
 
Project Member

Comment 1 by ClusterFuzz, Aug 20

Components: Blink>JavaScript>WebAssembly
Labels: Test-Predator-Auto-Components
Automatically applying components based on crash stacktrace and information from OWNERS files.

If this is incorrect, please apply the Test-Predator-Wrong-Components label.
Project Member

Comment 2 by ClusterFuzz, Aug 20

Labels: Test-Predator-Auto-Owner
Owner: verwa...@chromium.org
Status: Assigned (was: Untriaged)
Automatically assigning owner based on suspected regression changelist https://chromium.googlesource.com/v8/v8/+/378375d2e5b50aa6d36f8cacd5b24ff0e9d263c3 ([scanner] Templatize scan functions by encoding).

If this is incorrect, please let us know why and apply the Test-Predator-Wrong-CLs label. If you aren't the correct owner for this issue, please unassign yourself as soon as possible so it can be re-triaged.
Labels: Security_Impact-Head M-70
Status: Fixed (was: Assigned)
Project Member

Comment 5 by ClusterFuzz, Aug 21

ClusterFuzz has detected this issue as fixed in range 55225:55226.

Detailed report: https://clusterfuzz.com/testcase?key=6167910104694784

Fuzzer: decoder_langfuzz
Job Type: linux_ubsan_vptr_d8
Platform Id: linux

Crash Type: Bad-cast
Crash Address: 0x5562140309d0
Crash State:
  Bad-cast to CharacterStream<uint16_t>' (aka 'CharacterStream<unsigned short>') from v8::internal::RelocatingCharacterStream<unsigned char>
  v8::internal::wasm::AsmJsParser::AsmJsParser
  v8::internal::AsmJsCompilationJob::ExecuteJobImpl
  
Sanitizer: undefined (UBSAN)

Recommended Security Severity: High

Regressed: https://clusterfuzz.com/revisions?job=linux_ubsan_vptr_d8&range=55216:55217
Fixed: https://clusterfuzz.com/revisions?job=linux_ubsan_vptr_d8&range=55225:55226

Reproducer Testcase: https://clusterfuzz.com/download?testcase_id=6167910104694784

See https://github.com/google/clusterfuzz-tools for more information.

If you suspect that the result above is incorrect, try re-doing that job on the test case report page.
Project Member

Comment 6 by ClusterFuzz, Aug 21

Labels: ClusterFuzz-Verified
Status: Verified (was: Fixed)
ClusterFuzz testcase 6167910104694784 is verified as fixed, so closing issue as verified.

If this is incorrect, please add ClusterFuzz-Wrong label and re-open the issue.
Project Member

Comment 7 by sheriffbot@chromium.org, Aug 21

Labels: Pri-1
Project Member

Comment 8 by sheriffbot@chromium.org, Aug 21

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify

Comment 9 Deleted

Comment 10 Deleted

Labels: -reward-1500 reward-topanel
(fixing automation problems)
Labels: -reward-unpaid
Labels: -reward-topanel reward-0
This one was found by internal fuzzers too (mbarbella_js_mutation, ochang_js_fuzzer, inferno_js_fuzzer)
@awhalley there is nothing in this bug that says this was found by internal fuzzers or when it was found. Can you please provide pointers for that?
Beyond the fact that it was found by other fuzzers, the cast was an accidental left-over unnecessary (unused) downcast, so there was no security risk. Additionally the CL was reverted for performance reasons a day or 2 later.
Project Member

Comment 16 by sheriffbot@chromium.org, Nov 27

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment